Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2807 articles · 109645 vulns · 38/41 feeds (7d)
← Back to list
EST
PRE-CVEPATCHED
juniper · multiple products including junos os, junos os evolved, apstra, jsi vlwc

Multiple vulnerabilities in Juniper Networks products including Junos OS and Apstra

72% confidence

Description

Juniper Networks published security advisories addressing multiple vulnerabilities affecting various products including Apstra, JSI vLWC, Junos OS, and Junos OS Evolved across multiple versions and platforms such as SRX and MX Series. Users are advised to update to specified fixed versions to mitigate these vulnerabilities.

Affected Products

VendorProductVersions
junipermultiple products including junos os, junos os evolved, apstra, jsi vlwcApstra versions prior to 6.1.1, JSI vLWC versions prior to 3.0.94, Junos OS versions prior to 21.2R3-S10 on SRX Series, Junos OS all 21.3 versions on SRX Series, Junos OS 21.4 versions prior to 21.4R3-S12 on SRX Series, Junos OS all 22.1 versions on SRX Series, Junos OS 22.2 versions prior to 22.2R3-S8 on SRX Series, Junos OS all 22.4 versions on SRX Series, Junos OS 22.4 versions prior to 22.4R3-S9 on MX Series, Junos OS 23.2 versions prior to 23.2R2-S6 on SRX and MX Series, Junos OS 23.4 versions prior to 23.4R2-S7 on SRX and MX Series, Junos OS 24.2 versions prior to 24.2R2-S3 on SRX Series, Junos OS 24.2 versions prior to 24.2R2-S4 on MX Series, Junos OS 24.4 versions prior to 24.4R2-S3 on SRX and MX Series, Junos OS 25.2 versions prior to 25.2R1-S2, 25.2R2 on SRX and MX Series, Junos OS versions prior to 22.4R3-S7, Junos OS 23.2 versions prior to 23.2R2-S4, Junos OS 23.4 versions prior to 23.4R2-S7, Junos OS 24.2 versions prior to 24.2R1-S2, 24.2R2-S4, Junos OS 24.4 versions prior to 24.4R1-S2, 24.4R2-S3, Junos OS 25.2 versions prior to 25.2R1-S2, 25.2R2, Junos OS Evolved versions prior to 21.2R3-S8-EVO, Junos OS Evolved 21.4 versions prior to 21.4R3-S7-EVO, Junos OS Evolved 22.2 versions prior to 22.2R3-S4-EVO, Junos OS Evolved 22.3 versions prior to 22.3R3-S3-EVO, Junos OS Evolved 22.4 versions prior to 22.4R3-S2-EVO, Junos OS Evolved 23.2 versions prior to 23.2R2-S4-EVO, Junos OS Evolved 23.4 versions prior to 23.4R2-S8-EVO, Junos OS Evolved 24.2 versions prior to 24.2R2-S4-EVO, Junos OS Evolved 24.4 versions prior to 24.4R1-S1-EVO, 24.4R2-S3-EVO, Junos OS Evolved 25.2 versions prior to 25.2R1-S2-EVO, 25.2R2-EVO

Related News (1 articles)

Tier B
CCCS Canada4h ago
Juniper Networks security advisory (AV26-334)
→ No new info (linked only)
CISA KEV❌ No
Actively exploited❌ No
Patch available
see fixed versions listed for each product
PublishedApr 9, 2026
Last enriched4h ago
Tags
multiple productssecurity advisorysoftware update
Trending Score20
Source articles1
Independent1
Info Completeness6/14
Missing: cve_id, cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

MEDIUMCVE-2025-30650
Junos OS: Privileged local user can gain access to a Linux-based FPC as root
Trending: 42
HIGHCVE-2026-33797
Junos OS and Junos OS Evolved: An attacker sending a specific genuine BGP packet causes a BGP reset
HIGHCVE-2026-33790
Junos OS: SRX Series: In a NAT64 configuration, receipt of a specific, malformed ICMPv6 packet will cause the srxpfe process to crash and restart.
CRITICALCVE-2026-33784
JSI Virtual Lightweight Collector: Default password is not required to be changed which allows unauthorized high-privileged access
MEDIUMCVE-2026-33787
Junos OS: SRX1500, SRX4100, SRX4200, SRX4600: When a specific show command is executed chassisd crashes

Pin to Dashboard

Verification

State: reported
Confidence: 72%

Vulnerability Timeline

CVE Published
Apr 9, 2026
Patch Available
Apr 9, 2026
Discovered by ZDM
Apr 9, 2026